General
-
Target
c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118
-
Size
3.3MB
-
Sample
241205-e4ppaavmck
-
MD5
c5ea00ea5973347d54d66f12fb5ee242
-
SHA1
9ce9fe05b746d949ac3095c7b8ed70a34948a0e5
-
SHA256
36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e
-
SHA512
a6061f6d4b22f3e6561da3e2e27bbdf6e0e9ec812c2e584812d9e684c7e9dfb54c6454a8d818e65d82d89aa17e45d95a15e64e88e8ff33eab6fa284a68a1fe0f
-
SSDEEP
49152:Fq3j/91Zrb/TNvO90dL3BmAFd4A64nsfJeomo3d4jMQPvFPL8bg11VgjoCfEJZD1:FG91LomuSBPvqi4B
Static task
static1
Behavioral task
behavioral1
Sample
c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\phLK_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Targets
-
-
Target
c5ea00ea5973347d54d66f12fb5ee242_JaffaCakes118
-
Size
3.3MB
-
MD5
c5ea00ea5973347d54d66f12fb5ee242
-
SHA1
9ce9fe05b746d949ac3095c7b8ed70a34948a0e5
-
SHA256
36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e
-
SHA512
a6061f6d4b22f3e6561da3e2e27bbdf6e0e9ec812c2e584812d9e684c7e9dfb54c6454a8d818e65d82d89aa17e45d95a15e64e88e8ff33eab6fa284a68a1fe0f
-
SSDEEP
49152:Fq3j/91Zrb/TNvO90dL3BmAFd4A64nsfJeomo3d4jMQPvFPL8bg11VgjoCfEJZD1:FG91LomuSBPvqi4B
-
Hive family
-
Modifies security service
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
1Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
3